Deceptions Everywhere ®

Insights on threat and cyber risk trends, use cases for deception technology and strategies for combatting targeted attacks

Reduce Detection Blind Spots with Deceptive Emulations of IoT, OT, and Network Devices

When it comes to IoT devices – or other network devices including routers, switches and printers – the impossibility of effectively patching or monitoring them, along with their sheer diversity, creates a mass of ideal network locations for cyberattackers to carry out reconnaissance, surveillance and data theft undetected. This article will look at a deception-led approach to reducing detection blind spots surrounding these difficult-to-secure devices.
Read More

Healthcare Under Cyberattack – Advanced Ransomware, IoMT Devices, and Data Breaches

Healthcare institutions are facing unprecedented threats. We’ve all been rocked with horror at the major cyberattacks on hospitals this past week. What’s scary about these types of attacks is that they can very quickly lead to lost lives, not just lost dollars.
Read More

Better Together: Deterministic Lateral Threat Management and EDR

I am often asked how a lateral threat management solution, leveraging deterministic deception methods from endpoint to network and cloud, can be effective at stopping attacks in environments with an extensive threat detection stack already deployed. Read More

MITRE Shield Tactics Confirm that Deception Is Essential

We recently wrote about MITRE Shield, just after the initial release. In this article I’ll go into more detail about specific capabilities that Illusive platform provides, and how they map to the MITRE SHIELD framework. Read More

MITRE’s Shield Maps Tactics and Techniques to Achieve an Active Defense Posture

With the release of Shield, a rich knowledgebase built on over a decade of enemy engagement, MITRE is once again stepping in front of the pack, and leading the global cybersecurity ecosystem in thought and action.

According to MITRE, Shield is intended to stimulate discussion about Active Defense. Read More

Why Deception Gives Cybersecurity Teams the Upper Hand (part 2)

The first part of this guest post series from Kevin Fiscus, SANS instructor and cybersecurity expert, explained the challenges of early threat detection strategies. In part 2, we look at how a deception-focused strategy can confuse attackers, limit lateral movement, and give security teams back the advantage against attackers. Read More

We Are Failing At Information Security! (part 1)

Recent reports point to a troubling reality – threat detection strategies aren’t identifying attackers early enough, and dwell times are stubbornly high.

In this 2-part guest post series from Kevin Fiscus, SANS instructor and cybersecurity expert, we’ll take a deep dive into how deception technology can help. Read More

Actionable Forensics for SOAR: An Illusive Networks Integration with Cortex XSOAR

Arguably, defenders have more data and intelligence than ever about impending threats and attacks. According to a recent Ponemon Institute study, the average organization deploys 47 separate security solutions, each providing a dizzying array of alerts and reporting. If an intruder gets in, it should be easy to identify and stop them, right? Surely an alert has gone off somewhere in the system. Of course, it's not so simple.
Read More

The Agentless Advantage in Cybersecurity – Lower IT Burden and Risk

Agent vs. agentless: you’re likely familiar with the debate about which approach is best in today’s ever-changing threat environment. However, when it comes to detection of in-network threats, particularly using endpoint-based distributed deception as a strategy, an agentless approach is significantly more effective and safe. 

  Read More

Deception Platforms Positioned in the Peak of Inflated Expectations on the Gartner Hype Cycle for Security Operations, 2020

We’re excited to share that Gartner’s latest Hype Cycle for Security Operations, 2020 – available here to Gartner subscribers – has positioned Deception Platforms in the Peak of Inflated Expectations on the Hype Cycle. According to the report, “security operations technologies and services defend IT systems from attack through the identification of threats and exposure to vulnerability, enabling effective response and remediation. The innovations included here aim to help security and risk management leaders enhance their strategy.”

Read More